Springer Security and Cryptology titleshttp://www.springer.com/computer/security+and+cryptology?SGWID=0-40160-0-0-0
These are Springer recent titles in Security and CryptologyTue, 26 Sep 2017 19:54:07 GMT2017-09-26T19:54:07ZSpringer Security and Cryptologyhttp://images.springer.com/cda/content/designimage/cda_displaydesignimage.gif?SGWID=0-0-17-901483-0http://www.springer.com/computer/security+and+cryptology?SGWID=0-40160-0-0-0
Databases and Mobile Computinghttp://www.springer.com/us/book/9781441951625
Data Structures, Cryptology and Information TheoryWed, 13 Aug 2014 23:05:34 GMThttp://www.springer.com/us/book/97814419516252014-08-13T23:05:34ZTopics in Cryptology – CT-RSA 2008http://www.springer.com/us/book/9783540792635
The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings<br /><b>series:</b>Security and Cryptology<p>This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA in April 2008.The 26 revised full papers presented together with the abstract of 1 invited talk were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on hash function cryptanalysis, cryptographic ...Data EncryptionThu, 10 Jul 2014 06:21:19 GMThttp://www.springer.com/us/book/97835407926352014-07-10T06:21:19ZPrivacy Enhancing Technologieshttp://www.springer.com/us/book/9783540706304
8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings<br /><b>series:</b>Security and Cryptology<p>This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.The 13 revised full papers presented were carefully selected from&nbsp;48 submissions during two rounds of reviewing and improvement. The ...Data EncryptionThu, 10 Jul 2014 06:18:08 GMThttp://www.springer.com/us/book/97835407063042014-07-10T06:18:08ZDetection of Intrusions and Malware, and Vulnerability Assessmenthttp://www.springer.com/us/book/9783540705420
5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings<br /><b>series:</b>Security and Cryptology<p>This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2008, held in&nbsp;Paris, France&nbsp;in July 2008.The 13 revised full papers presented&nbsp;together with one extended abstract&nbsp;were carefully reviewed and selected from&nbsp;42 submissions. The papers are organized in topical ...Data EncryptionThu, 10 Jul 2014 06:04:57 GMThttp://www.springer.com/us/book/97835407054202014-07-10T06:04:57ZTransactions on Data Hiding and Multimedia Security IIIhttp://www.springer.com/us/book/9783540690191
<b>series:</b>Transactions on Data Hiding and Multimedia Security<p>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the ...Data EncryptionThu, 10 Jul 2014 05:55:32 GMThttp://www.springer.com/us/book/97835406901912014-07-10T05:55:32ZCryptographic Hardware and Embedded Systems – CHES 2008http://www.springer.com/us/book/9783540850533
10th International Workshop, Washington, D.C., USA, August 10-13, 2008, Proceedings<br /><b>series:</b>Security and Cryptology<p>This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA,&nbsp;during August 10-13, 2008.The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel ...Data EncryptionThu, 10 Jul 2014 05:09:35 GMThttp://www.springer.com/us/book/97835408505332014-07-10T05:09:35ZTrusted Computing - Challenges and Applicationshttp://www.springer.com/us/book/9783540689799
First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings<br /><b>series:</b>Security and Cryptology<p>This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research ...Systems and Data SecurityWed, 09 Jul 2014 23:22:39 GMThttp://www.springer.com/us/book/97835406897992014-07-09T23:22:39ZQuantum Attacks on Public-Key Cryptosystems(Yan)http://www.springer.com/us/book/9781441977229
Data Structures, Cryptology and Information TheoryWed, 09 Jul 2014 23:21:38 GMThttp://www.springer.com/us/book/97814419772292014-07-09T23:21:38ZNetwork Computing and Information Securityhttp://www.springer.com/us/book/9783642352119
Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings<br /><b>series:</b>Communications in Computer and Information Science<p>This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; ...Systems and Data SecurityThu, 21 Nov 2013 12:48:43 GMThttp://www.springer.com/us/book/97836423521192013-11-21T12:48:43ZVisual and Multimedia Information Managementhttp://www.springer.com/us/book/9780387355924
IFIP TC2/WG2.6 Sixth Working Conference on Visual Database Systems May 29–31, 2012 Brisbane, Australia<br /><b>series:</b>IFIP Advances in Information and Communication Technology<p>Current research in Visual Database Systems can be characterized by scalability, multi-modality of interaction, and higher semantic levels of data. Visual interfaces that allow users to interact with large databases must scale to web and distributed applications. Interaction with databases must employ multiple and more diversified interaction modalities, such as speech and gesture, in addition ...Data Structures, Cryptology and Information TheoryMon, 11 Nov 2013 00:01:52 GMThttp://www.springer.com/us/book/97803873559242013-11-11T00:01:52ZQuantum Attacks on Public-Key Cryptosystems(Yan)http://www.springer.com/us/book/9781441977212
Data Structures, Cryptology and Information TheoryWed, 01 May 2013 23:47:49 GMThttp://www.springer.com/us/book/97814419772122013-05-01T23:47:49ZSmartDatahttp://www.springer.com/us/book/9781461464082
Privacy Meets Evolutionary Robotics<p>SmartData empowers personal data by wrapping it in a cloak of intelligence such that it now becomes the individual’s virtual proxy in cyberspace. No longer will personal data be shared or stored in the cloud as merely data, encrypted or otherwise; it will now be stored and shared as a constituent of the binary string specifying the entire SmartData agent. This agent proactively builds-in ...Systems and Data SecurityWed, 27 Mar 2013 00:13:05 GMThttp://www.springer.com/us/book/97814614640822013-03-27T00:13:05ZResearch Advances in Database and Information Systems Securityhttp://www.springer.com/us/book/9780387355085
IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA<br /><b>series:</b>IFIP Advances in Information and Communication Technology<p>Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society. Research Advances in Database and Information Systems Security covers issues ...Data Structures, Cryptology and Information TheoryTue, 19 Mar 2013 06:55:07 GMThttp://www.springer.com/us/book/97803873550852013-03-19T06:55:07ZTrusted Systemshttp://www.springer.com/us/book/9783642353710
4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings<br /><b>series:</b>Security and Cryptology<p>This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on ...Systems and Data SecurityMon, 11 Feb 2013 09:52:51 GMThttp://www.springer.com/us/book/97836423537102013-02-11T09:52:51ZCyberspace Safety and Securityhttp://www.springer.com/us/book/9783642353628
4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings<br /><b>series:</b>Security and Cryptology<p>This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, ...Systems and Data SecurityMon, 11 Feb 2013 09:31:50 GMThttp://www.springer.com/us/book/97836423536282013-02-11T09:31:50Z